<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sardar-rats-sec-cons-02" category="info" consensus="true" submissionType="IETF" updates="9334" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RATS Security Considerations">Guidelines for Security Considerations of RATS</title>
    <seriesInfo name="Internet-Draft" value="draft-sardar-rats-sec-cons-02"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="February" day="08"/>
    <workgroup>RATS Working Group</workgroup>
    <keyword>security considerations</keyword>
    <keyword>remote attestation</keyword>
    <abstract>
      <?line 139?>

<t>This document aims to provide guidelines and best practices for writing
   security considerations for technical specifications for RATS
   targeting the needs of implementers, researchers, and protocol
   designers. This is a work-in-progress, and the current version mainly presents an outline of the topics that future versions
   will cover in more detail.</t>
      <ul spacing="normal">
        <li>
          <t>Corrections in published RATS RFCs</t>
        </li>
        <li>
          <t>Security concerns in two RATS drafts</t>
        </li>
        <li>
          <t>General security guidelines, baseline, or template for RATS</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/rats-sec-cons/draft-sardar-rats-sec-cons.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sardar-rats-sec-cons/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/rats-sec-cons"/>.</t>
    </note>
  </front>
  <middle>
    <?line 151?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="need-for-specialized-guidance-in-rats">
        <name>Need for Specialized Guidance in RATS</name>
        <t>Every Internet Draft needs to have a "Security Considerations" section.
While general guidelines such as <xref target="RFC3552"/> exist, the underlying threat model is that
the endpoint is fully trusted (i.e., all software and hardware components in the device may access the keys).
RATS <xref target="RFC9334"/> has a primarily different threat model in the sense that only parts of the endpoint (called Attester) are trusted (i.e., only specific software and hardware components in the device may access the keys), and the goal is to establish the trustworthiness of the endpoint.
In other words, <xref target="RFC3552"/> deals with a network adversary, whereas RATS deals with an endpoint adversary, which may have root access or physical control over the device with which it can extract keys from software or hardware.</t>
        <t>Moreover, remote attestation has several distinguishing features that necessitate a separate document.
One specific example of such a feature is the architectural complexity of the endpoint.
While network protocols typically have 2 roles, RATS has additional roles, which complicates
the picture.
Unfortunately, no guidelines currently exist for remote attestation <xref target="RFC9334"/> in RATS.
This document aims to fill this gap.</t>
      </section>
      <section anchor="needs-of-the-target-audience-of-rats">
        <name>Needs of the Target Audience of RATS</name>
        <t>Moreover, while the target audience of Internet Drafts is implementers, researchers, and protocol designers <xref target="I-D.irtf-cfrg-cryptography-specification"/>, RATS drafts generally do not fulfill these needs, in particular the needs of researchers and protocol designers.
On the other hand, in our observation, implementers generally find it hard to relate the abstract concepts of RATS to the real-world systems. In general, implementers and protocol designers of RATS are thus left with little or no guidance.</t>
      </section>
      <section anchor="inaccuracies-in-published-rats-rfcs">
        <name>Inaccuracies in Published RATS RFCs</name>
        <t>Unfortunately, many published RFCs of RATS provide inaccurate or ambiguous security and privacy considerations, which may lead to errors in design and implementation, and give a false
sense of security.
As an example, many proposed designs in <xref target="RFC9334"/> are broken.</t>
      </section>
      <section anchor="aggregator-in-coserv">
        <name>Aggregator in CoServ</name>
        <t>RATS has recently adopted <xref target="I-D.ietf-rats-coserv"/>, which has an ambiguous role Aggregator, for which -- in our assessment -- the authors have not yet provided a reasonable justification.
To the best of our knowledge and understanding, a malicious Aggregator breaks the security of the RATS ecosystem and invalidates the formal proofs for RATS primitives.
Surprisingly, during the three-week adoption call and one week discussion afterwards, one of the authors of the draft <xref target="I-D.ietf-rats-coserv"/> did not support adoption of the draft. Based on the above reasons, as researchers, we have genuine skepticism about this work. We request the authors to be transparent on this work and clarify the concerns raised at the adoption time (summarized to some extent in this draft).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>To improve the situation, this draft presents an outline of three topics that future versions will cover in more detail:</t>
        <ul spacing="normal">
          <li>
            <t>Corrections in published RATS RFCs <xref target="RFC9334"/>, <xref target="RFC9781"/>, <xref target="RFC9783"/> and <xref target="RFC9711"/></t>
          </li>
          <li>
            <t>Security concerns in one currently adopted RATS draft <xref target="I-D.ietf-rats-coserv"/> and one proposed for
adoption RATS draft <xref target="I-D.deshpande-rats-multi-verifier"/></t>
          </li>
          <li>
            <t>General security baseline that other drafts can simply point to, or guidelines or template that other drafts can use</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="general-hierarchy-of-authentication">
      <name>General Hierarchy of Authentication</name>
      <t>Authentication is a term which is often ambiguous in RATS specifications. We propose general hierarchy of one-way authentication <xref target="Gen-Approach"/>, which can help precisely
state the intended level of authentication (in decreasing order):</t>
      <ul spacing="normal">
        <li>
          <t>One-way injective agreement</t>
        </li>
        <li>
          <t>One-way non-injective agreement</t>
        </li>
        <li>
          <t>Aliveness</t>
        </li>
      </ul>
      <t>Recentness can be added to each of these levels of authentication.
Details will be added in future versions.</t>
    </section>
    <section anchor="threat-modeling">
      <name>Threat Modeling</name>
      <t>This section describes "What can go wrong?" TODO.</t>
      <section anchor="system-model">
        <name>System Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="actors">
        <name>Actors</name>
        <t>TODO.</t>
        <section anchor="legal-perspective">
          <name>Legal perspective</name>
          <ul spacing="normal">
            <li>
              <t>Data subject is an identifiable natural person (as defined in Article 4 (1) of GDPR <xref target="GDPR"/>).</t>
            </li>
            <li>
              <t>(Data) Controller (as defined in Article 4 (7) of GDPR <xref target="GDPR"/>) manages and controls what happens with personal data of data subject.</t>
            </li>
            <li>
              <t>(Data) Processor (as defined in Article 4 (8) of GDPR <xref target="GDPR"/>) performs data processing on behalf of the data controller.</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
        <section anchor="technical-perspective">
          <name>Technical perspective</name>
          <ul spacing="normal">
            <li>
              <t>Infrastucture Provider is a role which refers to the Processor in GDPR. An example of this role is a cloud service provider (CSP).</t>
            </li>
          </ul>
          <t>TODO.</t>
        </section>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>TODO.</t>
      </section>
      <section anchor="typical-security-goals">
        <name>Typical Security Goals</name>
        <t>TODO.</t>
      </section>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <t>Security considerations in RATS specifications need to clarify how the following attacks are avoided or mitigated:</t>
      <section anchor="evidence-replay-attacks">
        <name>(Evidence) Replay Attacks</name>
        <t>In this attack, a network or endpoint adversary -- with access to older Evidence -- can replay Evidence with stale Claims which no longer represent the actual state of the Attester, potentially resulting in exposure of confidential data <xref target="RA-TLS"/>.</t>
        <t>Replay of stale Evidence may be within the same connection or across multiple connections.</t>
      </section>
      <section anchor="diversion-attacks">
        <name>Diversion Attacks</name>
        <t>In this attack, a network adversary -- with Dolev-Yao capabilities <xref target="Dolev-Yao"/> and access (e.g., via
Foreshadow <xref target="Foreshadow"/>) to the attestation key of any machine in the world -- can redirect a connection intended
for a specific Infrastructure Provider to the compromised machine, potentially resulting in exposure of
confidential data <xref target="ID-Crisis"/>.</t>
        <t>In the context of confidential computing and TLS as a transport protocol, we reported these attacks to the TLS WG in February 2025 <xref target="Usama-TLS-26Feb25"/>. A formal proof is available
<xref target="ID-Crisis-Repo"/> for further research and
development. Since reporting to TLS WG, these attacks have been practically
exploited in <eref target="https://tee.fail/">TEE.fail</eref>, <eref target="https://wiretap.fail/">Wiretap.fail</eref>, and <eref target="https://badram.eu/">BadRAM</eref>.</t>
      </section>
      <section anchor="relay-attacks">
        <name>Relay Attacks</name>
        <t>In this attack, a network or endpoint adversary -- with access to suitable binding material -- can relay an attestation request to a genuine Attester and present the genuine Evidence as its own,
potentially resulting in impersonation of genuine Attester <xref target="RelayAttacks-RATS"/>.</t>
        <t>Note that <em>replay</em> is about <em>same</em> Attester while <em>relay</em> attack is about <em>different</em> Attesters.</t>
      </section>
    </section>
    <section anchor="potential-mitigations">
      <name>Potential Mitigations</name>
      <t>This section describes the countermeasures and their evaluation.</t>
      <t>To mitigate the above attacks, we propose post-handshake attestation.
We are not aware of any attacks on post-handshake attestation. Post-handshake attestation
avoids replay attacks by using a fresh attestation nonce. Moreover, considering TLS as the transport protocol, it avoids diversion and relay attacks
by binding the Evidence to the underlying TLS connection, such as using Exported Keying Material (EKM)
<xref target="I-D.ietf-tls-rfc8446bis"/>, as proposed in Section 9.2 of <xref target="ID-Crisis"/>. <xref target="RFC9261"/> and <xref target="RFC9266"/> provide mechanisms for such bindings. Efforts for a formal proof
of security of post-handshake attestation are ongoing.</t>
    </section>
    <section anchor="examples-of-specifications-that-could-be-improved">
      <name>Examples of Specifications That Could Be Improved</name>
      <section anchor="rfc9334">
        <name>RFC9334</name>
        <section anchor="unprotected-evidence">
          <name>Unprotected Evidence</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9334"/> has:</t>
          <blockquote>
            <t>A conveyance protocol that provides authentication and integrity protection can be used to convey Evidence that is otherwise unprotected (e.g., not signed).</t>
          </blockquote>
          <t>Using a conveyance protocol that provides authentication and integrity protection, such as TLS 1.3 <xref target="RFC8446"/>,
to convey Evidence that is otherwise unprotected (e.g., not signed) undermines all security of remote attestation.
Essentially, this breaks the chain up to the trust anchor (such as hardware manufacturer) for remote attestation.
Hence, remote attestation effectively provides no protection in this case and the security guarantees are limited
to those of the conveyance protocol only. In order to benefit from remote attestation, Evidence <bcp14>MUST</bcp14> be protected
using dedicated keys chaining back to the trust anchor for remote attestation.</t>
        </section>
        <section anchor="missing-definitions">
          <name>Missing definitions</name>
          <t><xref target="RFC9334"/> uses the term Conceptual Messages in capitalization without proper definition.</t>
        </section>
        <section anchor="missing-roles-and-conceptual-messages">
          <name>Missing Roles and Conceptual Messages</name>
          <ul spacing="normal">
            <li>
              <t>Identity Supplier and its corresponding conceptual message Identity are missing and need to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
            <li>
              <t>Attestation Challenge as conceptual message needs to be added to the architecture <xref target="Tech-Concepts"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="rfc9781">
        <name>RFC9781</name>
        <t>As argued above for RFC9334, security considerations in <xref target="RFC9781"/> are essentially insufficient.</t>
      </section>
      <section anchor="rfc9783">
        <name>RFC9783</name>
        <t><xref target="RFC9783"/> uses:</t>
        <ul spacing="normal">
          <li>
            <t>3x epoch handle (with reference to <xref section="10.2" sectionFormat="of" target="RFC9334"/> and
<xref section="10.3" sectionFormat="of" target="RFC9334"/>) whereas RFC9334 never uses epoch handle at all!</t>
          </li>
          <li>
            <t>1x epoch ID with no reference and no explanation of how it is
  different from epoch handle</t>
          </li>
        </ul>
      </section>
      <section anchor="rfc9711">
        <name>RFC9711</name>
        <section anchor="inaccurate-opinion">
          <name>Inaccurate opinion</name>
          <t><xref section="7.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>For attestation, the keys are associated with specific devices and are configured by device manufacturers.</t>
          </blockquote>
          <t>The quoted text is inaccurate and just an opinion of the editors.
It should preferably be removed from the RFC.
For example, in SGX, the keys are not configured by the manufacturer alone.
The platform owner can provide a random value called OWNER_EPOCH.</t>
          <t>For technical details and proposed text, see <xref target="Clarifications-EAT"/>.</t>
        </section>
        <section anchor="inaccurate-privacy-considerations">
          <name>Inaccurate Privacy Considerations</name>
          <t><xref section="8.4" sectionFormat="of" target="RFC9711"/> has:</t>
          <blockquote>
            <t>The nonce claim is based on a value usually derived remotely (outside of the entity).</t>
          </blockquote>
          <t>Attester-generated nonce does not provide any replay protection since the Attester can pre-generate an Evidence
that might not reflect the actual system state, but a past one.</t>
          <t>See the attack trace for Attester-generated nonce at <xref target="Sec-Cons-RATS"/>.</t>
          <t>For replay protection, nonce should <em>always</em> be derived remotely (for example, by the Relying Party).</t>
        </section>
      </section>
    </section>
    <section anchor="examples-of-parts-of-specifications-that-are-detrimental-for-security">
      <name>Examples of Parts of Specifications That are Detrimental for Security</name>
      <t>We believe that the following parts of designs are detrimental for the RATS ecosystem:</t>
      <section anchor="multi-verifiers">
        <name>Multi-Verifiers</name>
        <section anchor="security-considerations">
          <name>Security Considerations</name>
          <t>We believe the security considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/> must say:</t>
          <t>Compared to a single verifier, the use of multi-verifiers increases security risks in terms of increasing the Trusted Computing Base (TCB).</t>
        </section>
        <section anchor="privacy-considerations">
          <name>Privacy Considerations</name>
          <t>We believe the privacy considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/> should say:</t>
          <t>Compared to a single verifier, the use of multi-verifiers may increase the privacy risks, as potentially sensitive information may be sent to multiple verifiers.</t>
        </section>
        <section anchor="open-source">
          <name>Open-source</name>
          <t>Besides, the rationale presented by the authors at meeting 124 -- appraisal policy being the intellectual property of the vendors -- breaks the
open-source nature of RATS ecosystem. This requires blindly trusting the vendors and increases the attack surface.</t>
        </section>
      </section>
      <section anchor="aggregator-based-design">
        <name>Aggregator-based design</name>
        <t>Aggregator in <xref target="I-D.ietf-rats-coserv"/> is an explicit trust anchor and the addition of new trust anchor needs to have a strong justification.
Having a malicious Aggregator in the design trivially breaks all the guarantees.
It should be clarified how trust is established between Aggregator and Verifier in the context of Confidential Computing threat model.</t>
        <t>The fact that Aggregator has collective information of Reference Values Providers and Endorsers
makes it a special target of attack, and thus a single point of failure. It increases security
risks because Aggregator can be compromised independent of the Reference Values Providers and
Endorsers. That is, even if Reference Values Providers and Endorsers are secure, the compromise
of Aggregator breaks the security of the system.
Moreover, if Aggregator is not running inside a TEE, it is relatively easy to compromise the secrets.</t>
      </section>
    </section>
    <section anchor="security-considerations-1">
      <name>Security Considerations</name>
      <t>All of this document is about security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9781">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="RFC9783">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="S. Frost" initials="S." surname="Frost"/>
            <author fullname="M. Brossard" initials="M." surname="Brossard"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Arm's Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, along with open-source reference implementations, aimed at helping device makers and chip manufacturers integrate best-practice security into their products. Devices that comply with PSA can generate attestation tokens as described in this document, which serve as the foundation for various protocols, including secure provisioning and network access control. This document specifies the structure and semantics of the PSA attestation token.</t>
              <t>The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes the claims used in an attestation token generated by PSA-compliant systems, how these claims are serialized for transmission, and how they are cryptographically protected.</t>
              <t>This Informational document is published as an Independent Submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9783"/>
          <seriesInfo name="DOI" value="10.17487/RFC9783"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="Tech-Concepts" target="https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Technical Concepts</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="Gen-Approach" target="https://www.researchgate.net/publication/396593308_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_General_Approach">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: General Approach</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://eur-lex.europa.eu/eli/reg/2016/679/oj">
          <front>
            <title>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the pro- cessing of personal data and on the free movement of such data, and repealing Direc- tive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance)</title>
            <author initials="" surname="European Commission">
              <organization/>
            </author>
            <date year="2016" month="May"/>
          </front>
        </reference>
        <reference anchor="Dolev-Yao">
          <front>
            <title>On the security of public key protocols</title>
            <author initials="D." surname="Dolev">
              <organization/>
            </author>
            <author initials="A." surname="Yao">
              <organization/>
            </author>
            <date year="1983" month="March"/>
          </front>
        </reference>
        <reference anchor="Foreshadow" target="https://foreshadowattack.eu/">
          <front>
            <title>Foreshadow</title>
            <author initials="" surname="Jo Van Bulck">
              <organization/>
            </author>
            <author initials="" surname="Marina Minkin">
              <organization/>
            </author>
            <author initials="" surname="Ofir Weisse">
              <organization/>
            </author>
            <author initials="" surname="Daniel Genkin">
              <organization/>
            </author>
            <author initials="" surname="Baris Kasikci">
              <organization/>
            </author>
            <author initials="" surname="Frank Piessens">
              <organization/>
            </author>
            <author initials="" surname="Mark Silberstein">
              <organization/>
            </author>
            <author initials="" surname="Thomas F Wenisch">
              <organization/>
            </author>
            <author initials="" surname="Yuval Yarom">
              <organization/>
            </author>
            <author initials="" surname="Raoul Strackx">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.deshpande-rats-multi-verifier">
          <front>
            <title>Remote Attestation with Multiple Verifiers</title>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Ltd</organization>
            </author>
            <author fullname="zhang jun" initials="Z." surname="jun">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Houda Labiod" initials="H." surname="Labiod">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="7" month="February" year="2026"/>
            <abstract>
              <t>   IETF RATS Architecture, defines the key role of a Verifier.  In a
   complex system, this role needs to be performed by multiple Verfiers
   coordinating together to assess the full trustworthiness of an
   Attester.  This document focuses on various topological patterns for
   a multiple Verifier system.  It only covers the architectural aspects
   introduced by the Multi Verifier concept, which is neutral with
   regard to specific wire formats, encoding, transport mechanisms, or
   processing details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-deshpande-rats-multi-verifier-04"/>
        </reference>
        <reference anchor="I-D.ietf-rats-coserv">
          <front>
            <title>Concise Selector for Endorsements and Reference Values</title>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Shefali Kamal" initials="S." surname="Kamal">
              <organization>Fujitsu</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>AMD</organization>
            </author>
            <author fullname="Ding Ma" initials="D." surname="Ma">
              <organization>Alibaba Cloud</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   In the Remote Attestation Procedures (RATS) architecture, Verifiers
   require Endorsements and Reference Values to assess the
   trustworthiness of Attesters.  This document specifies the Concise
   Selector for Endorsements and Reference Values (CoSERV), a structured
   query/result format designed to facilitate the discovery and
   retrieval of these artifacts from various providers.  CoSERV defines
   a query language and corresponding result structure using CDDL, which
   can be serialized in CBOR format, enabling efficient interoperability
   across diverse systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-coserv-02"/>
        </reference>
        <reference anchor="Clarifications-EAT" target="https://mailarchive.ietf.org/arch/msg/rats/4V2zZHhk5IuxwcUMNWpPBpnzpaM/">
          <front>
            <title>Clarifications in draft-ietf-rats-eat</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="Sec-Cons-RATS" target="https://mailarchive.ietf.org/arch/msg/rats/jcAv9FKbYSIVtUNQ8ggEHL8lrmM/">
          <front>
            <title>Security considerations of remote attestation (RFC9334)</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="RA-TLS" target="https://www.researchgate.net/publication/385384309_Towards_Validation_of_TLS_13_Formal_Model_and_Vulnerabilities_in_Intel's_RA-TLS_Protocol">
          <front>
            <title>Towards Validation of TLS 1.3 Formal Model and Vulnerabilities in Intel's RA-TLS Protocol</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="A." surname="Niemi">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author initials="T." surname="Fossati">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="RelayAttacks-RATS" target="https://mailarchive.ietf.org/arch/msg/rats/6gbqx0XY8WYrH3Mx4vO8n2-uKgY/">
          <front>
            <title>Relay Attacks in Intra-handshake Attestation for Confidential Agentic AI Systems</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="ID-Crisis-Repo" target="https://github.com/CCC-Attestation/formal-spec-id-crisis">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal analysis of attested TLS protocols</title>
            <author initials="" surname="Muhammad Usama Sardar">
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Usama-TLS-26Feb25" target="https://mailarchive.ietf.org/arch/msg/tls/Jx_yPoYWMIKaqXmPsytKZBDq23o/">
          <front>
            <title>Impersonation attacks on protocol in draft-fossati-tls-attestation (Identity crisis in Attested TLS) for Confidential Computing</title>
            <author initials="" surname="Muhammad Usama Sardar">
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC9266">
          <front>
            <title>Channel Bindings for TLS 1.3</title>
            <author fullname="S. Whited" initials="S." surname="Whited"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document defines a channel binding type, tls-exporter, that is compatible with TLS 1.3 in accordance with RFC 5056, "On the Use of Channel Bindings to Secure Channels". Furthermore, it updates the default channel binding to the new binding for versions of TLS greater than 1.2. This document updates RFCs 5801, 5802, 5929, and 7677.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9266"/>
          <seriesInfo name="DOI" value="10.17487/RFC9266"/>
        </reference>
      </references>
    </references>
    <?line 401?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author wishes to thank Ira McDonald and Ivan Gudymenko for insightful discussions.
The author also wishes to thank the authors of <xref target="I-D.ietf-rats-coserv"/> (in particular Thomas
Fossati and Paul Howard) for several discussions, which unfortunately could not resolve the
above concerns, and hence led to this draft.</t>
    </section>
    <section numbered="false" anchor="history">
      <name>History</name>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Concrete text proposal for security and privacy considerations of multi-verifiers <xref target="I-D.deshpande-rats-multi-verifier"/></t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Introduction and motivation</t>
        </li>
        <li>
          <t>Defined replay and relay attacks</t>
        </li>
        <li>
          <t>Added mitigations</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vc63LbRpb+j6foUX6spCIoU5IVSTU7M7RE24otSyPJ8XhS
U6om0CQ7AgEEDVBmXH6XfZZ9sv3O6W5cKNLjZLKplE0CfTl9+jv3Q4dhGJS6
TNSp2HpV6VglOlVGTLJC3KqoKnS5FGdZavCmkKXGJ5FNxM3w7nYrkONxoRaY
SF83Dd8KIlmqaVYsT4VOJ1kQxFmUyjk2jAs5KUMji1gWIYab0KgojDApfLYf
VHmMieZUnBwcHAamGs+1MVixXOaYezG6eynEd0ImJgMFOo1VrvBHWm71xJaK
dZkVWib05WL4An/hQFsXN3cvt4K0mo9VcRrQ8qcBbadSU2GjsqhUgPMcBFi3
UPJUDG9Gw+AxKx6mRVblp3xu8QHfdToVr+hZ8KCWGBCfBiIUxrMg6rCAXhVq
npVKyBJHKvlxsFBpBQK+E8Kt/uEVfbHn626Cx3OpExryN/VJzvNE9aNsTs9l
Ec1Oxawsc3O6t9d6uYflsLQuZ9UYHJpXMzmfyzisjJxLx/W9Dte3MD4hnpcY
71dcO69vl+3rrLvC3uYr7c/KebIVBLIqZ1lB7MJuQkyqJLFo2Lp0O4n3tJO4
5UW2eFRWTGWqf2W+nYq79+K8UAaXzS+VZU19wnumtG+J+FtZhbEd3I8V9k+z
Yo51FuC8EDcvzwhdp6KYRAwz++j744F9hA/+0cA/GtSPjg/8qIMgIGx3Vz4+
PDziAfTBPjp4/nyfH9EHPLpT0SyEvEQqL80pn0Z4abxWhcl1VBGeIHLDBjni
EtPADzM3ECmSt4km5APv+DLPqxLIOeXFUx3xQ7uDZaZg4IurqMwgB2L/2f7z
nttaFlNVNmh6fHzsg3eKMDbFpH6qyr28GidYlQjZOzg5Gpyc7J88u29Re59N
7lvU3jfU3uv0vk3tfU3tfU3svSfWklTDhf8LcV4I6mVfvO87gODNK5WGwzwv
MglR+IOZiLUhxonw6/9/sPA5oPfs+D9moSP13pP6Gxh4fn2zwrgbNa0Sy6jt
0fsdHHFwtHf0/QlxsZwpMaqKLFcyFdeySDQEOC2FTGO8Duj1WValkU5o9P73
YF6Bz7SEwHr0HhSWKuLlMSSVZUVMzsEBsjCP0C7QmFPQJ8rMTwiDSMECQCli
ih2KObgJaXe2K08KpcQ8WygmCSNNFc14VI+HFbATMqFVznUB3RSQxIqT53uH
R3ujM7HtL/yc1r1uyGwYsiO279Sn0lI5Gg2xZKIWEqjd6aDjUi7FYY+PvQEc
qirCRH3qK2KmxF97ML97OPieZ/de9vNXrrG+BIDAWUcMOM9ATvhRZitXemUZ
VBsp4iIDUcCG8Y1kUZaYlTMAt2JwcnzQ+wod5327affpsC9ABJ69zCABMxln
jysUNS9+q1hN6pmwqDJ6IN59hcAfMvEj2PSiSqKHFUmQhU6luNQpzG331dVE
F+KDAl/VynEhiioh1fBkzgssZ8QbafRDpLuvXhYyfRDXGhhWqXlCxYO41QlO
bUq1uujdLJtLI172QQ2UgJds//pjtQBeP8oCDkHnxY3MqkTclgUY9AmvLsLz
vi7KSRhNimkYFcu8zKaFzGfL0OQq0hOnk07d2BgsziEzylryeZWUOlyoAgNV
4QdphQX5fZQZVSzo+Vkii3o1E46GdysX3x1A+tc6Ds1iSpYdTAwGtRbZCAry
AwivEGgmqw+3YY8e7M3NlB2VvcMf93/95+vZw/OL6tNj9P7y3Yf8+kWe/prL
y3X4Wa8u4emS0TYhuYMrJ7td7wKSsD11AcW2c0C6imP/uXhHCszJwOHvP+7P
0XBx8vLN+OPtxY/l+3d/P55OR6/fHifF/Dcc92YY3r115/THvIPgFbGBVCU6
ll6PY5gY9A9I4OeA5GWGcIKV7o9VQlp1rBNdQgDowi/SUiX/ZdzqrGlJ/VhG
uDs/WMeH325hj58fHB8ePDu5d1TfN1STocX294ODe0v0PRN9D6LvV4gmy+uI
vrdE33uig281tF3t+E6r+YqSeN0XdxDwbAJBn65ogT74agzIpjtRiVwOWfWt
hSG/F26AY3chQzgRMdTmg+p4QhTsdfyf4ZQ+RGJ4IW6XUEhzsyqLP8i0ksWS
rmWTcfsGeB5Nx798evaPj8cfPhavDy4/HS6ujtP9sHoz/fjt8Lw4D8+gdLXp
IvSCD0PhKL/8mo/n4DqEO7GkobWjqGKCdBuSbTw+/714PDk+PjgZHA7uPY33
lsav+HYOnJ7Exj9UMeH39wAQby6zChiYyCdAG8Ida7M2vFH5qjvx2xksWwyW
LQZv8D2+ould+ElR7tnZWdgC8x5HYQkbtFDHsHJE3Ndc4XVRJ4bwV5LycP/o
pRrvP189/ty5oCxC0kkaPvrDNFZtYsU2LBMTdrR/zcKoZmEbeDtPJbNmapdT
RwIkFl4if599BHV7P3y6X15nHz9cXryRv/xjfm2W5Zt/vjj/Zf8g+5p7tYmH
tX9AJ3eB8NgKKhm+/SMXU+ND/ejIPzoKgn6/HwRhGAo5NuTFlEFwNwOf4iyq
bMShEb0hQgDPF+CRmDYZLDI7Y7AS7zBRRy6p9QjjDPYR/RuyNTysrGPnjmdk
X5K+DWr+UihBfnWqVMzQ1pSBIfKAj57wqoC/EFF5y2jAw9JTGBkDtU8Hw/9S
UL4p1GmIgVPMdtNoC9Bb0LHhg5GvTzmhNCHXHXukJZ1ZZFVJ5/dhWpkhogSL
ZrIUkwpRlvKTWSYedZLg+HhE2JvDqQZJJWACvu8CbNguql001mFmBmxyGgzX
ZTCo7fBEqrBDy8fMDmIBoGE+rKqZ3lxVT4yl4Y+cpYO5ySkL1bCaITDXcZyo
IPiOTVkWV0wYvn8n3oHzNmNJdwXb/iu+UzKTYjIih1cZ4ZRLdjsKaGRxTpS5
SwOCZhJRoGz5bytZTCKcPvWDDzOdAGnuPC3EcaAJP/3z59BleL58EeqTNmWP
76KCJ10kS4uXAg4uGE4Okrb3w3GzSuM807hiPKTU2JKSkqwPtnVf9QEFXJjJ
JiUcGcW4mEHY+AuUYZ6ljANtI71YLYB7oGQpZESxMz9FsGd2+gFfjyWVPFCQ
OpOEPjjZczjn2DnWk4livHXJ9WFkapQFVsYglEVpPOzqY2xDhBJQ79RasUOJ
1dUz8XwvZ3/E6RqJmWbSMjgTpHYZwFYwiARIWjmju3tCeD+4gCzhSUHiGAOj
nVuNlUxcmkICQ7TQg5AxiRZ0cE88YqKSxslAa3DasKYzXAM6dBKGYZFlpT8T
UI34zLAqgoQB+YlgeW2xgJe2a+hSRLTJJ1aXzA0xQWDYcBULeqZCyC8h8rRc
b110QoAwasE4jwFjILcC/wjAE0UpG+U0S6o4M1OS1EpMARboo1fT/eAKGqm+
YJejrnMz0q9mJUFxSltT3oWTQnTzCcTIZiy6l2Rl0V9A7UZQDp04ljiG7oOl
CSkavg/GeRxrOiPWd68s/3gzUvbKsDxiGaKsH7yn9G5ZwdyrBDeWZm3Jd3oZ
27G4sy5aw8+OtDm11N9g0SakmUt6NZV5v1ZzNVDv2PbAUYu1Ii3nijKtC31k
3jDW7VjZGttVg2x4vtFsNTYL5/nWjMKXL722PfDak5RMBl6SbUrcibGv1co9
tjnQKjqq4LZ0bWyLvA3UEeh4jpViinx4xawqRDamTAVT1uucu0XYRGNZiNPM
JSELxUaJ8em8EWvy8rIuiflkJWQ/CQHJJBbGxk99cNwvvrLlBub6JVlfzioj
EjVxOUfEo2XCkuxgSHbOYuQihd6A2EQuyr5eY7NXoDyX6bJt2zGk3tz7Vdot
W/Kucj7W0wqxQ2PN7SH0Qkar7lRbuyVKMi9VUWSFTfvweXl6zRR3L/Rsqtkq
T6BAVWAtDmkNt2s/GLLP4xSKP0qR5ZnBSezavE1H8oij4yJ7UKnl2XA6pVxz
mRU2hrkFNoJaU8ADsqIt4ywno+VQv5L2IoTbg7J6SVtMIgXT2qRn/VAeG4Ye
ktIYqFBWAXjIKGNP21gNRjKyVKW/kBhMIQMDBTbG4j/DltWyBo1iUcjeL9hF
yz+k2SPs8NRaVfZEoJXSGLocnAbjoPQ0Edtixhg7PJgnOWP6ztxRODmj215f
urBZFWWn2DiMCM4mjdvM7oWmlDsE9LYqcgp80inhMMYOzpUmf0OFj0o9WK6T
8iR17vL8sHj0CiYpqjjpLaBUVMG5nR6/d2R6FrqvrHw23h/Wi5nPpspzCEiz
dXt6X7yQBC5XbZDjbKHcVZCiNF3F+ajs9UHyK/LKzQPUBTht5jSzKq2GJ+NF
uV3M/aWiS2vTDnEZk7siUwNlyDWNtJnGHIk4m7q0IYL3wgupiU7pVvNnKfVc
iW1TzcnJIz8Z65sMz+Ay0OLaLc6H3bECchtluSJUQUQLOi9DQpeVk9RmwuZQ
hKoyXwlGNkcip98WiXRE3HtrVL/tfDsg8U/j+sEArzfFMISjxrB76W+s2GYg
eZTWmgjoD+obeLLCV9PsTN+T4MkHTM7/ZgvnTCu5f4Z0KTQh+5llxmFVy11p
B1nrF6igbinUQhC0oMwD8Z1Oda5gFrVtaoDjwu62dZDF1uX72ztqt6C/xbsr
/nwz+vv7i5vROX2+fT18+7b+ELgRt6+v3r89bz41M8+uLi9H787tZDwVnUfB
1uXw45a1EltX13cXV++Gb7ca+Nb+FJlPFiFN5hb4pFuUJgDXo0KPFWku8eLs
+n//Z3CIC/kTwLQ/GJzgGu2X48H3ZDTg0TubxNGK/Qq2LQOZ5xB4WoU0VCRz
+MGJ1QVmlj3CjVbsau/+RJz516n48zjKB4d/cQ/owJ2Hnmedh8yzp0+eTLZM
XPNozTY1NzvPVzjdpXf4sfPd87318M9/ZVyGg+O//oUh5LH7GmAmvWjr8FBu
nGK2nTDdrzYLgsua+6CGNDi0U8umOu95JTvDStRJXR2hz9obQyzDR4oYuzt+
/tzuIWhsOcnCTCU56TVobfhLgSm9G0iASskWJ4iRuNS9suo2OzgRWQeuWhew
ujusz64cGTr9mdQaOTkwu+z9tN6mWRquHzFM8ITi1iC4Yf+EY1iidky6PrZ6
XeEszniBH0yleUpmPzhnRet0cL0AiF9R0mQNxJ3NBXCZhBJpHL645IjwQgV1
8IEUC1E0zcRjkaXTv26Ju6vzK2dSrOPAqwTN42EEx8M0D74Tb+GM2MaA3PKB
2Me1eVONiTWMFmCGM6QTzf5Qt59AbEMUY9Jc9lRDCikw6lBsD3aIH9T+QBDA
X1++wObtim3aYYfUHwXcCZTj5jW+X7MGeaJy6rKQLmwHf4klM9IXvseh28WA
ZeLWyVqEXBcZRdjZ1+g4XkcHNiBHzNiFc7sMg5GgMpPJpPZuaEBUHxjsb91C
00q0chMX6aSQpqw4SiYyyTstrASz32vlqFATZX0Z2qo5DU5AlPbFMG2nBViF
83ReKEqyCpEUjCtlO3K/yfbZ7fVOm84ONtuPbTagMfOvMmjoeoAvkwXBpuLt
em3D0Sidyftf0PbO9U2S7JG47MsCnM5aZOy549jkAVNpKD5l+rZHdCDqHxE3
Km8V7igJxbyw6/RaySas8jSTRKGDzTO5hFgmsoRY5TegASSThd2mfsyToNnA
8bOEUxD23hBfJhBdRekM59pZdxL3Tf4I60IHIJ/i68HvKG25AoYSk8ifAS80
XTE0MwEFU6J2WYPB9/mzLat++dIntcYUUrTHZNWkUhw5thT7TKScs9+b+oYi
RFNRkeH87EoRppq3xkLiXPsc+r9n9VP21h02ZO6bqvbnz/UL5wW6e9hW/Wm/
JxZaBk3LC4Y3X0hWnXS0M0bkXpHCRlg7hzIny+oObbML9XXG1MtUCtnmg7dP
AQVfssm/OZktVoXW7U8psCKbc/TgNv22Kw3WXWldQuRbvUh9kFJSB9UqDCJf
3WLmUWWQU9I2+KGQzOdJOLICJPFMxc6+eVlzx6DZH14RiZ3SGEh6UtkDaWLY
CVhZ7yyoXAZzErROwYVQXC6xdFIV7Df7iI+IhlsJK5vlnPYUt5oQa+nk2DZz
ZPVWaOYgcaxU6qtVxOgAvE0yXVpN/9PdaNSfgKR/bft6XqkUP9nb6YmfPgAB
pcxXhjy2nu65vPhPL2R8M7xsBo0lXP85tVC5gK/TPfAHKCFT6ZIN81hzygG4
gqKgG68BTBvKtAP+OhrOsKWPoL2WcRmnRiX5AbWiAHQ0peYe016wEb66U8XF
xT/ZB1pptdeCofwu89HTrtWmuwwajup3SSXtNmvYVOwun3LX8bE1ui60NFOs
r3XtyRaX1mJw4LXB47KCVVGUM4fHydl5VwbRuKeFTCrn71Eo701QK4vhwMiy
5Z1o/FG2ukZa19MPPii2a5Qykba0YDVVuxa+eToOt+ldwKbSeCvl1xsvEZey
cqAmTzPrgCWlyJ06Gnz625twmuA0ia37PNUluhRux7g2C7ZVtLV9gO09fLkB
1uPM6ZtWdY+2a/Rwry4MWupHn5zaeqN49KWXhe3Rm8udoJVV6FbNKSrBInVS
Aei9dSA46e8T87va1ic59o8G3azH/tERHvjU7rxpgyalxrS6cyKeGk0oV2xf
yY6KDFqJWG4l3XidjBJ4EVATU4b1yHp6HIvcdl2qOxKos6yCbXuhxIXNN8VW
KdlWOeuQvk9dBzEY4W8CrPMM+b5/SIt3i5twtj6f/lJh2pfgLwIaP6LsxpKL
xHUCniXa8casBnQ2z1mqKR+61cPsIq/KOIeQF25BhBalKJbsxSMsK9DS0O+8
A049UvI/Ji383iH9D6OxgaHv0rNwIHQBWsEfQLaVgbltv0iSDjyelsP6wYg6
Ya1WdknEVsoZqATCq9zLFxdscbpoRlGQP0tdH0bAVU0kezTFzoYCXD94Teda
W+tUUMEc1XA/hWNtmrUv2eeWImlUXWBu9TNIqBaYZOvtJ5TmBnKZ+szUXvK6
+6SMEheIOENg01UpYrzSlm6fUttr7ohTSOO6oR47Wi0Dv4/LmLGtATM36fmY
TM86lm5iGYvbpTZu1Sb/16mpAPlOv1Laxv2Eg0KES7gAHAnr1OfG3O942Ekg
+0cajdKP9dorm95QgZYZvmZdikF9F9VtleeJdr4B2f6I0sbQ9lZrR83suZ3d
TGUIuf1otg/t2umUldK0ggB1fr9DbsFup7HybEbdD+mUnZE129fdJ791G68P
6fdJXAQrphWlNdmOc63FKsvexianpijGOXJmgGrkkfq6qgn0sub6fbPfQdBJ
ptO9c0br4JOAm8vlrzSGs7PtfsPBjo21ko16HjyzBqtdlIPv3Blw0B2w0/RU
2KOBeVQsYOB1dobOwgn+BJoGnqaLc+uRplmLIr7mjAKYRDb+H8XwmrSebfqs
W2BYEtv7NDwZDCxeL1pF0hxQpu6k9SaJ6w5rTNJLsrJtMfcdLTaBYEwWaZZp
G6/7gM62gVgRsb0yiKmmgE5MPlPdJ9MoSPIuKXvPOwN0FItx+2F9AFrqZ6sd
/GHq7gv+bSWWuCgpwU2mOmeuwsPn0Jy0yIKqHsQyrha+POtT4NsUasl3efWP
lfORJemSTq/bdONis1T1mXYqX5A/Qg4+3pAF9i6NFNDEMTYnn1cJ14J09eHd
6OZ+dH119hrHf9lp8otdBtTV4q2DRWwhASIJfPqLBieGnWu/dhXwbu9YGwXH
/xYFfDj2ZimvpOd0MWNfcpTuSJWpbPcEPEditVXceLANhUpbN60ypN7IofCR
RWjz4nTvdpc4Y0tXNuxLl971blk/o61L0AqNLM9VvSKBpXbG2HmY6+ms5MWB
kIQyFO3skc0BcxKpJ8YVpS9ySTVruuPgVimfD2GbhcDY6raNJ5Gl1THNjzP4
kl6yZVs5T8/NcQjelcmjXJpdwu9Tpk7a2HW4RFTI7vu1LCyDu37ttW+HW+fg
EtrPVVlobndIOr+2DiiuGivYsYXzwLopxbrPzrc3SFsq7Sz2tEZvM42XXFv8
0dUWjQXwhpbHLh1qoyUBKd2Spfm2uiZm4a6NXII0amuWhbV/UnBHAJcdeKjr
nrQ+1OpWQCVZBdXqRUEAZH/zQL6I7chN6yIMp4Zc+2HdTM01fbF9d/Zixwn1
BkleYcn6jpffzxEHxv+UJ3OuLFm+dOhkztgospUQob4abskQ9W+YubeYlbnN
r2RNKrXexnHqKldpaLKqgMy/UMQGY4mz3KDcrUvTNDrd9zaQhlC2g3qwf0jJ
IJnn1LhAQWaW6IhI8LdGQU1COqSyISh8xqYhZaGg8LEilmhiiCBraLM1obpP
rhEM13lNySZNKZNxguDX9936vf3yNrjyiGtpJ1MVMFJqtaEotJrbimrQbTTa
2D6gXVMTNSLCFel46T7s8P2L/OtZ9dgdtNrUbEqqv612Cb2WCxtirm3+qZts
uT8L2mVhweK4K22vXivqafsDY+VqIhqH56oIk4eD1U24BAZVPlLKs7Ur/1bM
AcyT0EoWr/8pRKc92Xk25DFY7dlafcZeOGNoFe0Ei9oz/JFsrKkT4/baR4wA
Uppz+UDxTOlz6qDFdVja37XYJClfVGUa0bVpUgyhXCz1lIqLco36Cqz6GqtI
kni3yHdJhnZ+vvXPXtStWV89RlAfo29NkYa0Qp0huv12DrDJYXpVb6VkQFmh
b2shc9LXaljVnanaOiVFlaY2V2usa3c3GvWsh25bMm3IDh4ubebFU+I3LVRJ
qirYbOeCYZLUVce6caROz26we7Qm/Rhh+G74ZMFuSy/BDoEGj5R1EYp/1EDR
OFcgI9+gRzMQW5/af6RExf+9xc2PW18srq3mhP8PCXKlDvpV8UUhxWV0Tuo2
5ru6WAAsr6p4ifUeMvYJiIPwxiZV0uqcM/32svSPqTxZe6WRbqPa2u6269of
LQfuJ4tM1LXE3q/5N5g2RdNqLvf0+M6Lqt2kSnntJHZ+pMkSa34DG+76ni0r
czPGb+JDad+Yxv7Za22ArOV67obPBrbTjCSS8uKkc2ws4Jyqb2h2/d2mn/bf
twX15sctvBF8UG1blanxwVX+fWb8SZJ6Vww5jzBv1Qv+Dyl8mVfjRwAA

-->

</rfc>
